Î÷ÃÅ×ÓÐÞ¸´¿ÉÓ°ÏìµçÍøÎȶ¨µÄ©¶´CVE-2023-28489
Ðû²¼Ê±¼ä 2023-05-091¡¢Î÷ÃÅ×ÓÐÞ¸´¿ÉÓ°ÏìµçÍøÎȶ¨µÄ©¶´CVE-2023-28489
¾ÝýÌå5ÔÂ5ÈÕ±¨µÀ£¬Î÷ÃÅ×ÓÐÞ¸´ÁËÓ°ÏìSicam A8000 CP-8031ºÍCP-8050²úÎïµÄCPCI85¹Ì¼þµÄÔ¶³ÌÖ´ÐдúÂë©¶´£¨CVE-2023-28489£©¡£ÕâЩ²úÎïÊÇÔ¶³ÌÖն˵¥Ôª(RTU)£¬¹¥»÷Õß¿ÉÀûÓøÃ©¶´ÍêÈ«¿ØÖÆÉ豸£¬Ó°ÏìµçÍøµÄÎȶ¨£¬ÉõÖÁ¿Éͨ¹ý¸ü¸ÄÒªº¦×Ô¶¯»¯²ÎÊýµ¼ÖÂÍ£µç£¬»¹¿ÉÒÔÀûÓøÃ©¶´°²×°ºóÃÅ¡£²¹¶¡Ôڹ̼þ°æ±¾CPCI85 V05»ò¸ü¸ß°æ±¾ÖпÉÓ㬸ù«Ë¾»¹Ö¸³ö£¬Í¨¹ýʹÓ÷À»ðǽÏÞÖÆ¶ÔTCP¶Ë¿Ú80ºÍ443ÉϵÄWeb·þÎñÆ÷µÄ·ÃÎÊ£¬Ò²¿ÉÒÔ»º½â¸Ã©¶´¡£
https://www.securityweek.com/critical-siemens-rtu-vulnerability-could-allow-hackers-to-destabilize-power-grid/
2¡¢ÃÀ¹úNextGen HealthcareÔ¼100ÍòÓû§µÄÐÅϢй¶
¾Ý5ÔÂ8ÈÕ±¨µÀ£¬ÃÀ¹úÈí¼þºÍ·þÎñ¹«Ë¾NextGen Healthcareй¶ÁËÔ¼100ÍòÈ˵ÄÐÅÏ¢¡£¸Ã¹«Ë¾Ö÷ҪΪҽÁƱ£½¡ÐÐÒµ¿ª·¢ºÍÏúÊÛµç×Ó½¡¿µ¼Ç¼£¨EHR£©Èí¼þºÍʵ¼ù¹ÜÀíϵͳ¡£¾ÝϤ£¬Ð¹Â¶Ê¼þÓÚ4ÔÂ24ÈÕ±»·¢ÏÖ£¬¸Ã¹«Ë¾ÊÓ²ìÈ·¶¨¹¥»÷ÕßÔÚ3ÔÂ29ÈÕÖÁ4ÔÂ14ÈÕ·ÃÎÊÁ˹«Ë¾µÄϵͳ£¬Ó°ÏìÁË1049375ÈË¡£¹«Ë¾Í¸Â¶¹¥»÷ÕßʹÓÃÁËËÆºõÊÇ´ÓÆäËüÀ´Ô´»òÓëNextGenÎ޹صĹ¥»÷ʼþÖÐÇÔÈ¡µÄ¿Í»§¶Ëƾ¾Ý·ÃÎÊÊý¾Ý¿â£¬ËüÃÇÖØÐÂÉèÖÃÁËÃÜÂëÒÔ¿ØÖƸÃʼþ¡£ÕâÊÇNextGenÔÚ½ñÄê·¢ÉúµÄµÚ¶þÆðй¶Ê¼þ£¬1ÔÂ19ÈÕ£¬ËüÔâµ½ÁËBlackCatµÄÀÕË÷¹¥»÷¡£
https://securityaffairs.com/145935/data-breach/nextgen-healthcare-data-breach.html
3¡¢ÎÚ¿ËÀ¼CERT-UA·¢ÏÖÖ¼ÔÚ·Ö·¢SmokeLoaderµÄµöÓã»î¶¯
ýÌå5ÔÂ8Èճƣ¬ÎÚ¿ËÀ¼CERT-UAÅû¶ÁËÒÔ¶àÓïÑÔÎļþµÄÐÎʽ·Ö·¢¶ñÒâÈí¼þSmokeLoaderµÄµöÓã»î¶¯¡£¹¥»÷ÕßÀûÓñ»Ñ¬È¾ÕÊ»§·¢ËÍÒÔ¡°Õ˵¥/¸¶¿î¡±ÎªÖ÷ÌâµÄÓʼþ£¬¸½¼þΪZIPÎĵµ¡£Õâ¸öZIPÊÇÒ»¸ö¶àÓïÑÔÎļþ£¬°üÂÞÒ»¸öÓÕ¶üÎĵµºÍÒ»¸öJavaScriptÎļþpax_2023_AB1058..js¡£JavaScriptÎļþʹÓÃPowerShell£¬ÏÂÔØ²¢ÔËÐпÉÖ´ÐÐÎļþportable.exe£¬Ëü½«Æô¶¯¶ñÒâÈí¼þSmokeLoader¡£¶ÔÓòÃû×¢²áÈÕÆÚºÍÎļþ±àÒëÈÕÆÚµÄ·ÖÎö±íÃ÷£¬¸Ã»î¶¯Ê¼ÓÚ4Ô·ݣ¬CERT-UA½«¸Ã»î¶¯¹éÒòÓÚUAC-0006¡£
https://securityaffairs.com/145911/malware/cert-ua-smokeloader-campaign.html
4¡¢Ñо¿ÈËÔ±Åû¶AkiraÔÚ½üÆÚµÄÀÕË÷¹¥»÷µÄÏêϸÐÅÏ¢
5ÔÂ7ÈÕ±¨µÀ³Æ£¬Ñо¿ÈËÔ±·¢ÏÖÁËAkiraÔÚ½üÆÚµÄÀÕË÷¹¥»÷¡£AkiraÓÚ3Ô·ÝÍÆ³ö£¬Éù³ÆÒѹ¥»÷ÁË16¼Ò¹«Ë¾£¬Éæ¼°½ÌÓý¡¢½ðÈÚ¡¢·¿µØ²ú¡¢ÖÆÔìºÍ×ÉѯµÈ¸÷¸öÐÐÒµ¡£ËäÈ»ÁíÒ»¸öÃûΪAkiraµÄÀÕË÷Èí¼þÒÑÓÚ2017ÄêÐû²¼£¬µ«¾ÝÐÅÓëÕâЩ»î¶¯²¢²»Ïà¹Ø¡£Akira»áÔËÐÐPowerShellÃüÁîɾ³ý¾íÓ°¸±±¾£¬¼ÓÃÜÎļþ²¢¸½¼ÓÀ©Õ¹Ãû.akira£¬È»ºóÔÚÿ¸öÎļþ¼ÐÁôÏÂÊê½ð¼Ç¼akira_readme.txt¡£ÆäÊê½ðÒªÇó´Ó20ÍòÃÀÔªµ½Êý°ÙÍòÃÀÔª²»µÈ¡£
https://www.bleepingcomputer.com/news/security/meet-akira-a-new-ransomware-operation-targeting-the-enterprise/
5¡¢FortiGuard·¢ÏÖSideCopyÍÅ»ïÕë¶ÔÓ¡¶ÈµÄ¹¥»÷»î¶¯
5ÔÂ4ÈÕ£¬FortiGuard³ÆÆä·¢ÏÖÁËSideCopyÍÅ»ïÀûÓÃÓ¡¶È¾üÊÂÑо¿×éÖ¯Ïà¹ØÖ÷ÌâµÄ¹¥»÷»î¶¯¡£¹¥»÷ÕßʹÓÃÓëÓ¡¶È¹ú·ÀÑо¿ÓëÉú³¤×éÖ¯(DRDO)ÓйصÄZIPÎļþÀ´·Ö·¢¶ñÒâÈí¼þ¡£ZipÎļþ°üÂÞÒ»¸ö¿ì½Ý·½Ê½Îļþ£¬Ëü»áʹÓÃHTAs·¨Ê½»òmshta.exe¶¨Ïòµ½¹¥»÷ÕßµÄÓò¡£ÔÚÕâÀÃüÁîÐвÎÊýÖ¸ÏòÒ»¸öURL£¬»áÏÂÔØ²¢Ö´ÐÐÒ»¸ö¶ñÒâÎļþPantomime.hta¡£´ËÍ⣬ÓëÒÔÍùµÄ»î¶¯ÓÐËù²îÒ죬´Ë´ÎµÄpayloadËÆºõÊÇʹÓù¤¾ßSILENTTRINITY´´½¨µÄ¡£
https://www.fortinet.com/blog/threat-research/clean-rooms-nuclear-missiles-and-sidecopy
6¡¢CleafyÐû²¼drIBANÕë¶ÔÒâ´óÀûµÄ¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß
5ÔÂ4ÈÕ£¬CleafyÐû²¼Á˹ØÓÚÀûÓÃеÄWeb×¢È빤¾ß°üDrIBANµÄ¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£ÕâЩ»î¶¯µÄÒªº¦×é¼þdrIBAN£¬ÊÇÒ»¸ö¾ßÓÐÇ¿´óATSÒýÇæµÄWeb×¢È빤¾ß°ü£¬¹¥»÷ÕßÀûÓÃËüÀÖ³ÉÈÆ¹ýÉí·ÝÑéÖ¤»úÖÆ£¬ÀýÈçÒøÐкͽðÈÚ»ú¹¹ÔڵǼºÍÖ§¸¶¹ý³ÌÖнÓÄɵÄMFAºÍSCAÊÚȨ½×¶Î¡£¹¥»÷Á´Ê¼ÓÚ¾¹ýÈÏÖ¤µÄÓʼþ£¨»òPECÓʼþ£©£¬¸½´øÒ»¸ö¿ÉÖ´ÐÐÎļþ£¬×÷ΪsLoad¶ñÒâÈí¼þµÄÏÂÔØ·¨Ê½¡£sLoadÊÇÒ»ÖÖÕì²ì¹¤¾ß£¬»¹Í¨¹ýÀÄÓúϷ¨µÄWindows¹¤¾ß£¨ÈçPowerShellºÍBITSAdmin£©À´ÀûÓÃLotL¼¼Êõ¡£´Ë´Î»î¶¯Ö÷ÒªÕë¶ÔÒâ´óÀû½ðÈÚÐÐÒµ¡£
https://www.cleafy.com/cleafy-labs/uncovering-driban-fraud-operations-chapter1